We present a link between the interactive proof assistant Isabelle/HOL and the SPARK/Ada tool suite for the verification of high-integrity software. Using this link, we can tackle verification problems that are beyond reach of the proof tools currently available for Spark. To demonstrate that our methodology is suitable for real-world applications, we show how it can be used to verify an efficient library for big numbers. This library is then used as a basis for an implementation of the RSA public-key encryption algorithm in SPARK/Ada
Computer software is developed through software engineering. At its most precise, software engineer...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
Assurance cases are often required to certify critical systems. The use of formal methods in assuran...
Doctor of PhilosophyDepartment of Computing and Information SciencesJohn M. HatcliffHigh-integrity a...
Many distributed systems use a minimum spanning tree (MST) as the backbone of efficient communicatio...
There is a strong link between software quality and software reliability. By decreasing the probabil...
Software is an increasingly integral and sophisticated part of safety- and mission-critical systems....
International audienceAmong formal methods, the deductive verification approach allows establishing ...
We present a case-study of developing a simple software module using contracts, and rigorously verif...
Safe operation is crucial to safety-critical systems, and formal verification of implementations is ...
An approach to generating provably correct sequential code from formallydeveloped algorithmic design...
The standard SPARK deductive verification tools, based on contracts, are not practical in early stag...
Abstract. We describe results and status of a sub project of the Verisoft [1] project. While the Ver...
In this paper, we outline our vision for building verification tools for Cyber-Physical Systems base...
This work presents a verification of an implementation in SPARK/ADA [1] of the cryptographic hash-fu...
Computer software is developed through software engineering. At its most precise, software engineer...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
Assurance cases are often required to certify critical systems. The use of formal methods in assuran...
Doctor of PhilosophyDepartment of Computing and Information SciencesJohn M. HatcliffHigh-integrity a...
Many distributed systems use a minimum spanning tree (MST) as the backbone of efficient communicatio...
There is a strong link between software quality and software reliability. By decreasing the probabil...
Software is an increasingly integral and sophisticated part of safety- and mission-critical systems....
International audienceAmong formal methods, the deductive verification approach allows establishing ...
We present a case-study of developing a simple software module using contracts, and rigorously verif...
Safe operation is crucial to safety-critical systems, and formal verification of implementations is ...
An approach to generating provably correct sequential code from formallydeveloped algorithmic design...
The standard SPARK deductive verification tools, based on contracts, are not practical in early stag...
Abstract. We describe results and status of a sub project of the Verisoft [1] project. While the Ver...
In this paper, we outline our vision for building verification tools for Cyber-Physical Systems base...
This work presents a verification of an implementation in SPARK/ADA [1] of the cryptographic hash-fu...
Computer software is developed through software engineering. At its most precise, software engineer...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
Assurance cases are often required to certify critical systems. The use of formal methods in assuran...